Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.083642] ================================================================== [ 15.083683] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 15.083731] Write of size 1 at addr fff00000c592c678 by task kunit_try_catch/137 [ 15.083959] [ 15.084041] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.084224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.084629] Hardware name: linux,dummy-virt (DT) [ 15.084805] Call trace: [ 15.084826] show_stack+0x20/0x38 (C) [ 15.084877] dump_stack_lvl+0x8c/0xd0 [ 15.084923] print_report+0x118/0x5d0 [ 15.084968] kasan_report+0xdc/0x128 [ 15.085012] __asan_report_store1_noabort+0x20/0x30 [ 15.085062] kmalloc_oob_right+0x538/0x660 [ 15.085105] kunit_try_run_case+0x170/0x3f0 [ 15.085152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.085490] kthread+0x328/0x630 [ 15.085540] ret_from_fork+0x10/0x20 [ 15.085587] [ 15.085604] Allocated by task 137: [ 15.085632] kasan_save_stack+0x3c/0x68 [ 15.085671] kasan_save_track+0x20/0x40 [ 15.086082] kasan_save_alloc_info+0x40/0x58 [ 15.086120] __kasan_kmalloc+0xd4/0xd8 [ 15.086155] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.086203] kmalloc_oob_right+0xb0/0x660 [ 15.086237] kunit_try_run_case+0x170/0x3f0 [ 15.086273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.086314] kthread+0x328/0x630 [ 15.086344] ret_from_fork+0x10/0x20 [ 15.086378] [ 15.086396] The buggy address belongs to the object at fff00000c592c600 [ 15.086396] which belongs to the cache kmalloc-128 of size 128 [ 15.086453] The buggy address is located 5 bytes to the right of [ 15.086453] allocated 115-byte region [fff00000c592c600, fff00000c592c673) [ 15.086516] [ 15.086534] The buggy address belongs to the physical page: [ 15.086563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.086615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.086660] page_type: f5(slab) [ 15.086696] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.086744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.086783] page dumped because: kasan: bad access detected [ 15.086812] [ 15.086828] Memory state around the buggy address: [ 15.086857] fff00000c592c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.086898] fff00000c592c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.086939] >fff00000c592c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.086975] ^ [ 15.087041] fff00000c592c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087088] fff00000c592c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087153] ================================================================== [ 15.088961] ================================================================== [ 15.089013] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 15.089094] Read of size 1 at addr fff00000c592c680 by task kunit_try_catch/137 [ 15.089145] [ 15.089173] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.089263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.089289] Hardware name: linux,dummy-virt (DT) [ 15.089330] Call trace: [ 15.089350] show_stack+0x20/0x38 (C) [ 15.089588] dump_stack_lvl+0x8c/0xd0 [ 15.089639] print_report+0x118/0x5d0 [ 15.089684] kasan_report+0xdc/0x128 [ 15.089728] __asan_report_load1_noabort+0x20/0x30 [ 15.089778] kmalloc_oob_right+0x5d0/0x660 [ 15.089869] kunit_try_run_case+0x170/0x3f0 [ 15.090058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.090195] kthread+0x328/0x630 [ 15.090435] ret_from_fork+0x10/0x20 [ 15.090520] [ 15.090537] Allocated by task 137: [ 15.090609] kasan_save_stack+0x3c/0x68 [ 15.090704] kasan_save_track+0x20/0x40 [ 15.090772] kasan_save_alloc_info+0x40/0x58 [ 15.090818] __kasan_kmalloc+0xd4/0xd8 [ 15.090948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.091006] kmalloc_oob_right+0xb0/0x660 [ 15.091114] kunit_try_run_case+0x170/0x3f0 [ 15.091193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.091235] kthread+0x328/0x630 [ 15.091265] ret_from_fork+0x10/0x20 [ 15.091298] [ 15.091315] The buggy address belongs to the object at fff00000c592c600 [ 15.091315] which belongs to the cache kmalloc-128 of size 128 [ 15.091371] The buggy address is located 13 bytes to the right of [ 15.091371] allocated 115-byte region [fff00000c592c600, fff00000c592c673) [ 15.091446] [ 15.091472] The buggy address belongs to the physical page: [ 15.091501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.091872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.091922] page_type: f5(slab) [ 15.092006] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.092057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.092095] page dumped because: kasan: bad access detected [ 15.092126] [ 15.092395] Memory state around the buggy address: [ 15.092449] fff00000c592c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.092745] fff00000c592c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.092921] >fff00000c592c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.092960] ^ [ 15.093005] fff00000c592c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093046] fff00000c592c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093083] ================================================================== [ 15.076331] ================================================================== [ 15.076668] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 15.077530] Write of size 1 at addr fff00000c592c673 by task kunit_try_catch/137 [ 15.077636] [ 15.078393] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 15.078536] Tainted: [N]=TEST [ 15.078568] Hardware name: linux,dummy-virt (DT) [ 15.078783] Call trace: [ 15.078947] show_stack+0x20/0x38 (C) [ 15.079077] dump_stack_lvl+0x8c/0xd0 [ 15.079137] print_report+0x118/0x5d0 [ 15.079197] kasan_report+0xdc/0x128 [ 15.079242] __asan_report_store1_noabort+0x20/0x30 [ 15.079293] kmalloc_oob_right+0x5a4/0x660 [ 15.079337] kunit_try_run_case+0x170/0x3f0 [ 15.079388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.079440] kthread+0x328/0x630 [ 15.079483] ret_from_fork+0x10/0x20 [ 15.079642] [ 15.079679] Allocated by task 137: [ 15.079820] kasan_save_stack+0x3c/0x68 [ 15.079887] kasan_save_track+0x20/0x40 [ 15.079923] kasan_save_alloc_info+0x40/0x58 [ 15.079962] __kasan_kmalloc+0xd4/0xd8 [ 15.079997] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.080037] kmalloc_oob_right+0xb0/0x660 [ 15.080073] kunit_try_run_case+0x170/0x3f0 [ 15.080109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.080151] kthread+0x328/0x630 [ 15.080194] ret_from_fork+0x10/0x20 [ 15.080249] [ 15.080307] The buggy address belongs to the object at fff00000c592c600 [ 15.080307] which belongs to the cache kmalloc-128 of size 128 [ 15.080398] The buggy address is located 0 bytes to the right of [ 15.080398] allocated 115-byte region [fff00000c592c600, fff00000c592c673) [ 15.080469] [ 15.080545] The buggy address belongs to the physical page: [ 15.080733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.081135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.081452] page_type: f5(slab) [ 15.081745] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.081809] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.081914] page dumped because: kasan: bad access detected [ 15.081955] [ 15.081980] Memory state around the buggy address: [ 15.082213] fff00000c592c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.082282] fff00000c592c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.082336] >fff00000c592c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.082388] ^ [ 15.082467] fff00000c592c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.082509] fff00000c592c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.082570] ==================================================================
[ 11.842920] ================================================================== [ 11.844128] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.845211] Write of size 1 at addr ffff8881032bb573 by task kunit_try_catch/153 [ 11.846030] [ 11.847144] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.847523] Tainted: [N]=TEST [ 11.847557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.847786] Call Trace: [ 11.847851] <TASK> [ 11.847989] dump_stack_lvl+0x73/0xb0 [ 11.848075] print_report+0xd1/0x610 [ 11.848104] ? __virt_addr_valid+0x1db/0x2d0 [ 11.848130] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.848151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.848174] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.848196] kasan_report+0x141/0x180 [ 11.848218] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.848245] __asan_report_store1_noabort+0x1b/0x30 [ 11.848270] kmalloc_oob_right+0x6f0/0x7f0 [ 11.848292] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.848316] ? __schedule+0x10cc/0x2b60 [ 11.848464] ? __pfx_read_tsc+0x10/0x10 [ 11.848488] ? ktime_get_ts64+0x86/0x230 [ 11.848515] kunit_try_run_case+0x1a5/0x480 [ 11.848543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.848566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.848591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.848616] ? __kthread_parkme+0x82/0x180 [ 11.848638] ? preempt_count_sub+0x50/0x80 [ 11.848663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.848688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.848713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.848738] kthread+0x337/0x6f0 [ 11.848770] ? trace_preempt_on+0x20/0xc0 [ 11.848795] ? __pfx_kthread+0x10/0x10 [ 11.848816] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.848837] ? calculate_sigpending+0x7b/0xa0 [ 11.848863] ? __pfx_kthread+0x10/0x10 [ 11.848885] ret_from_fork+0x116/0x1d0 [ 11.848904] ? __pfx_kthread+0x10/0x10 [ 11.848925] ret_from_fork_asm+0x1a/0x30 [ 11.848986] </TASK> [ 11.849050] [ 11.861092] Allocated by task 153: [ 11.861375] kasan_save_stack+0x45/0x70 [ 11.861921] kasan_save_track+0x18/0x40 [ 11.862316] kasan_save_alloc_info+0x3b/0x50 [ 11.862869] __kasan_kmalloc+0xb7/0xc0 [ 11.863241] __kmalloc_cache_noprof+0x189/0x420 [ 11.863737] kmalloc_oob_right+0xa9/0x7f0 [ 11.864149] kunit_try_run_case+0x1a5/0x480 [ 11.864306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.864950] kthread+0x337/0x6f0 [ 11.865075] ret_from_fork+0x116/0x1d0 [ 11.865209] ret_from_fork_asm+0x1a/0x30 [ 11.865550] [ 11.865871] The buggy address belongs to the object at ffff8881032bb500 [ 11.865871] which belongs to the cache kmalloc-128 of size 128 [ 11.867165] The buggy address is located 0 bytes to the right of [ 11.867165] allocated 115-byte region [ffff8881032bb500, ffff8881032bb573) [ 11.867818] [ 11.867968] The buggy address belongs to the physical page: [ 11.868309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032bb [ 11.869467] flags: 0x200000000000000(node=0|zone=2) [ 11.870319] page_type: f5(slab) [ 11.871107] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.871887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.872717] page dumped because: kasan: bad access detected [ 11.873186] [ 11.873268] Memory state around the buggy address: [ 11.873766] ffff8881032bb400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.874425] ffff8881032bb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.875319] >ffff8881032bb500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.875893] ^ [ 11.876142] ffff8881032bb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.876408] ffff8881032bb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.877188] ================================================================== [ 11.879836] ================================================================== [ 11.880427] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.880886] Write of size 1 at addr ffff8881032bb578 by task kunit_try_catch/153 [ 11.881144] [ 11.881313] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.881354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.881365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.881386] Call Trace: [ 11.881398] <TASK> [ 11.881412] dump_stack_lvl+0x73/0xb0 [ 11.881441] print_report+0xd1/0x610 [ 11.881463] ? __virt_addr_valid+0x1db/0x2d0 [ 11.881719] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.881746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.881783] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.881827] kasan_report+0x141/0x180 [ 11.881850] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.881876] __asan_report_store1_noabort+0x1b/0x30 [ 11.881902] kmalloc_oob_right+0x6bd/0x7f0 [ 11.881925] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.881948] ? __schedule+0x10cc/0x2b60 [ 11.881970] ? __pfx_read_tsc+0x10/0x10 [ 11.882010] ? ktime_get_ts64+0x86/0x230 [ 11.882034] kunit_try_run_case+0x1a5/0x480 [ 11.882058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.882082] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.882105] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.882148] ? __kthread_parkme+0x82/0x180 [ 11.882168] ? preempt_count_sub+0x50/0x80 [ 11.882192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.882216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.882241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.882266] kthread+0x337/0x6f0 [ 11.882285] ? trace_preempt_on+0x20/0xc0 [ 11.882308] ? __pfx_kthread+0x10/0x10 [ 11.882376] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.882411] ? calculate_sigpending+0x7b/0xa0 [ 11.882435] ? __pfx_kthread+0x10/0x10 [ 11.882456] ret_from_fork+0x116/0x1d0 [ 11.882475] ? __pfx_kthread+0x10/0x10 [ 11.882495] ret_from_fork_asm+0x1a/0x30 [ 11.882526] </TASK> [ 11.882536] [ 11.892921] Allocated by task 153: [ 11.893092] kasan_save_stack+0x45/0x70 [ 11.893281] kasan_save_track+0x18/0x40 [ 11.893650] kasan_save_alloc_info+0x3b/0x50 [ 11.893872] __kasan_kmalloc+0xb7/0xc0 [ 11.894046] __kmalloc_cache_noprof+0x189/0x420 [ 11.894249] kmalloc_oob_right+0xa9/0x7f0 [ 11.894748] kunit_try_run_case+0x1a5/0x480 [ 11.894968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.895206] kthread+0x337/0x6f0 [ 11.895452] ret_from_fork+0x116/0x1d0 [ 11.895627] ret_from_fork_asm+0x1a/0x30 [ 11.895819] [ 11.895908] The buggy address belongs to the object at ffff8881032bb500 [ 11.895908] which belongs to the cache kmalloc-128 of size 128 [ 11.896599] The buggy address is located 5 bytes to the right of [ 11.896599] allocated 115-byte region [ffff8881032bb500, ffff8881032bb573) [ 11.897126] [ 11.897217] The buggy address belongs to the physical page: [ 11.897570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032bb [ 11.897909] flags: 0x200000000000000(node=0|zone=2) [ 11.898125] page_type: f5(slab) [ 11.898283] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.898885] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.899197] page dumped because: kasan: bad access detected [ 11.899556] [ 11.899713] Memory state around the buggy address: [ 11.899930] ffff8881032bb400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.900212] ffff8881032bb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.901944] >ffff8881032bb500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.902171] ^ [ 11.902536] ffff8881032bb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.903067] ffff8881032bb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.903718] ================================================================== [ 11.904582] ================================================================== [ 11.904954] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.905286] Read of size 1 at addr ffff8881032bb580 by task kunit_try_catch/153 [ 11.906508] [ 11.906794] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.906884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.906897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.906918] Call Trace: [ 11.906929] <TASK> [ 11.906944] dump_stack_lvl+0x73/0xb0 [ 11.906975] print_report+0xd1/0x610 [ 11.906997] ? __virt_addr_valid+0x1db/0x2d0 [ 11.907019] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.907040] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.907064] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.907086] kasan_report+0x141/0x180 [ 11.907108] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.907134] __asan_report_load1_noabort+0x18/0x20 [ 11.907159] kmalloc_oob_right+0x68a/0x7f0 [ 11.907182] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.907204] ? __schedule+0x10cc/0x2b60 [ 11.907227] ? __pfx_read_tsc+0x10/0x10 [ 11.907248] ? ktime_get_ts64+0x86/0x230 [ 11.907272] kunit_try_run_case+0x1a5/0x480 [ 11.907296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.907319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.907343] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.907367] ? __kthread_parkme+0x82/0x180 [ 11.907387] ? preempt_count_sub+0x50/0x80 [ 11.907410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.907435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.907468] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.907494] kthread+0x337/0x6f0 [ 11.907513] ? trace_preempt_on+0x20/0xc0 [ 11.907537] ? __pfx_kthread+0x10/0x10 [ 11.907558] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.907579] ? calculate_sigpending+0x7b/0xa0 [ 11.907603] ? __pfx_kthread+0x10/0x10 [ 11.907625] ret_from_fork+0x116/0x1d0 [ 11.907643] ? __pfx_kthread+0x10/0x10 [ 11.907663] ret_from_fork_asm+0x1a/0x30 [ 11.907694] </TASK> [ 11.907703] [ 11.919331] Allocated by task 153: [ 11.919801] kasan_save_stack+0x45/0x70 [ 11.919972] kasan_save_track+0x18/0x40 [ 11.920112] kasan_save_alloc_info+0x3b/0x50 [ 11.920267] __kasan_kmalloc+0xb7/0xc0 [ 11.920449] __kmalloc_cache_noprof+0x189/0x420 [ 11.920676] kmalloc_oob_right+0xa9/0x7f0 [ 11.920876] kunit_try_run_case+0x1a5/0x480 [ 11.921067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.921304] kthread+0x337/0x6f0 [ 11.921466] ret_from_fork+0x116/0x1d0 [ 11.921638] ret_from_fork_asm+0x1a/0x30 [ 11.921939] [ 11.922100] The buggy address belongs to the object at ffff8881032bb500 [ 11.922100] which belongs to the cache kmalloc-128 of size 128 [ 11.923201] The buggy address is located 13 bytes to the right of [ 11.923201] allocated 115-byte region [ffff8881032bb500, ffff8881032bb573) [ 11.924344] [ 11.924527] The buggy address belongs to the physical page: [ 11.925031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032bb [ 11.925718] flags: 0x200000000000000(node=0|zone=2) [ 11.926167] page_type: f5(slab) [ 11.926498] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.927146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.927699] page dumped because: kasan: bad access detected [ 11.927879] [ 11.927948] Memory state around the buggy address: [ 11.928103] ffff8881032bb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.928319] ffff8881032bb500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.928853] >ffff8881032bb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.929477] ^ [ 11.929790] ffff8881032bb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.930469] ffff8881032bb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.931092] ==================================================================